Let us assume canisters have credentials they need to use. The request from a client is sent to a boundary node. The boundary nodes could be malicious. So how can we avoid “man in the middle” attack at the boundary node? Can messages be encrypted or is it upto the canister developer to worry about this? Thanks in advance.
Related topics
Topic | Replies | Views | Activity | |
---|---|---|---|---|
Guarding against malicious node providers | 3 | 360 | May 9, 2024 | |
Environment variables security on a frontend casniter | 20 | 120 | November 29, 2024 | |
Regarding the issue of whitelisted addresses | 9 | 1061 | October 13, 2022 | |
How would Internet Identity handle a denial of service attack? | 17 | 3185 | July 4, 2023 | |
Let's talk about boundary nodes as a high-risk point of failure for the IC | 19 | 1681 | September 5, 2023 |